Back to bug 2085393
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| TEJ RATHI | 2022-05-13 09:02:38 UTC | CC | michal.skrivanek, mperina, sbonazzo | |
| TEJ RATHI | 2022-05-13 09:03:57 UTC | Blocks | 2085396 | |
| TEJ RATHI | 2022-05-17 06:09:21 UTC | Depends On | 2087006 | |
| TEJ RATHI | 2022-05-17 06:11:11 UTC | Depends On | 2087008 | |
| FrantiĊĦek Hrdina | 2022-05-17 06:38:52 UTC | CC | fhrdina | |
| TEJ RATHI | 2022-05-18 04:25:19 UTC | Doc Text | A NULL Pointer Dereference flaw was found in vims' vim_regexec_string() function in regexp.c file. This flaw occurs when the function tries to match buffer with invalid pattern. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering a NULL Pointer Dereference that causes an application to crash leading to a denial of service. | |
| TEJ RATHI | 2022-05-18 04:29:38 UTC | Doc Text | A NULL Pointer Dereference flaw was found in vims' vim_regexec_string() function in regexp.c file. This flaw occurs when the function tries to match buffer with invalid pattern. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering a NULL Pointer Dereference that causes an application to crash leading to a denial of service. | A NULL Pointer Dereference flaw was found in vim's vim_regexec_string() function in regexp.c file. This flaw occurs when the function tries to match buffer with invalid pattern. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering a NULL Pointer Dereference that causes an application to crash leading to a denial of service. |
| RaTasha Tillery-Smith | 2022-05-18 12:19:50 UTC | Doc Text | A NULL Pointer Dereference flaw was found in vim's vim_regexec_string() function in regexp.c file. This flaw occurs when the function tries to match buffer with invalid pattern. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering a NULL Pointer Dereference that causes an application to crash leading to a denial of service. | A NULL pointer dereference flaw was found in vim's vim_regexec_string() function in regexp.c file. The issue occurs when the function tries to match the buffer with an invalid pattern. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering a NULL pointer dereference that causes an application to crash, leading to a denial of service. |
| Sandro Bonazzola | 2022-11-18 15:45:05 UTC | CC | sbonazzo | |
| Red Hat Bugzilla | 2023-07-07 08:34:59 UTC | Assignee | security-response-team | nobody |
Back to bug 2085393